|OHM2013: Ajin Abraham - Abusing Exploiting and Pwning with Firefox Add-ons|
|OHM2013: Pedro Noel - The Associated Whistle-Blowing Press|
Present the initiative of the Associated Whistle-Blowing Press, AWP, a decentralized network of whistle-blowing platforms and international newswire focused on denouncing human-rights violations. About the AWP The Associated Whistle-Blowing Press (AWP) is a not-for-profit information agency to be based in Iceland, dedicated to bringing forth and analyzing leaked information coming from different sources around the world...
Keywords: OHM2013; lightening talk; associated whistle-blowing press; whistleblowing; press; Pedro Noel
|OHM2013: Karnei Gozman - Introduction to Quantum Perturbation|
A birds eye view of the diagrammatic representation of Rayleigh-Schrödinger Perturbation Theory(RSPT), a general formula for generating perturbed calculations. plus a a brief, mostly inaccurate introduction to programing for quantum computers. Quantum computation requires a different type of calculation unlike current modern day stochastic analysis. Rayleigh-Schrödinger Perturbation Theory is a good place to start thinking about where this new computation could lead us.Program event page: htt...
Keywords: OHM2013; talk; Karnei Gozman; quantum perturbation; RSPT; Rayleigh-Schrödinger Perturbation Theory; quantum computation
|OHM2013: RFguy - Open source access control for Hackerspaces|
Presentation of the open source access system that ist used on the muCCC location. Give an Overview of munich chapter access control, schemtic of the universal Lock controller, that can control a wide variation of door locks. Information about the Lockbus protocol, one mastercontroller handle the commands of SSH host for user access. Software structure Know issuesProgram event page: https://program.ohm2013.org/event/58.html
Keywords: OHM2013; talk; RFguy; open source; access control; hackerspace; muCCC
|OHM2013: Soheil Eskandari Bavani - Reverse Engineering of VMFS|
During this research I have analyzed the newest file system of VMware on bitlevel which is called Virtual Machine File System version 5 (VMFS-5). The purpose of this research concerned a review of the structure of VMFS. During this research I have analyzed the newest file system of VMware on bitlevel which is called Virtual Machine File System version 5 (VMFS-5). The purpose of this research concerned a review of the structure of VMFS...
Keywords: OHM2013; talk; Soheil Eskandari Bavani; VMWare; VMFS; Virtual Machine File System; reverse engineering
|OHM2013: Jeroen van der Ham - Testing Mobile Netneutrality|
KPN and others are violating the Dutch Netneutrality laws. Learn how we found out and how you can help too! The Internet Society Netherlands has a working group looking at the transparency of the Internet. In this group we already looked critically at the PirateBay website blockade, and we have created an app to test the openness of your Internet connection. In this talk I describe how we further confirmed results from the app...
Keywords: OHM2013; talk; Jeroen van der Ham; mobile; network neutrality; neutrality; testing; Internet Society Netherlands; the pirate bay; pirate bay
|OHM2013: Felicitus - Solar Powered Autonomous Routers|
Considerations on how to build a solar powered autonomous router, from planning phase to the final project. In this talk I'll go through the considerations on how to plan and build a solar powered autonomous router. This includes calculations on the solar panel size, which components the setup needs, how the system can do self-monitoring and what you can possibly do with such a system. This talk is also suitable to learn the basics for stand-alone photo-voltaic systems; you don't necessarily pow...
Keywords: OHM2013; talk; solar; solar power; router; autonomous; routing; SolarWind; Felicitus
|OHM2013: Ronald van der Knijff - Forensic Hardware Hacking @NFI|
Forensic Hardware Hacking History - Behind the scenes of the Netherlands Forensic Institute (NFI). Historical overview of hardware methods and tools for digital forensics. Real case examples included. Topics covered include: - How to fool a DES FPGA hacker in the nineteenth century - Brute force robotics - ZERT-box – user friendly cracking of PDA passwords - Reloading phone cards with fault injection - IKEA bomb threat with mobile phones - MTK – Forensic Flash Imaging - Bank robbery attem...
Keywords: OHM2013; talk; Ronald van der Knijff; forensic; hardware; hacking; FPGA; DES; EMV; smartcard; criminals; elections; bank robbery; COTS; MITM; Man in the middle; Netherlands Forensic Institute; NFI
|OHM2013: Ot van Daalen - Bits of Freedom: four years after HAR2009|
Bits of Freedom got relaunched at HAR2009. Now that four years have passed we would like to provide you with a summary of what we did in the meantime, but also what we are working on right now.Program event page: https://program.ohm2013.org/event/89.html
Keywords: OHM2013; talk; freedom; Ot van Dalen; HAR; HAR2009; Hacking at Random
|OHM2013: The Center for Genomic Gastronomy - FoodPhreaking: Hacking the Food System Beyond the Screen and Outside of the Home Kitchen|
Hacker and maker communities are increasingly interested in food, food politics and food security. From open source kitchen hardware, to recipe databases there are many natural crossovers. However, food is not code. This talk will present a few projects that are attempts at hacking the food system beyond the screen and outside of the home kitchen. We will have copies of our new journal 'FoodPhreaking" on hand...
Keywords: OHM2013; talk; The Center for Genomic Gastronomy; foodphreaking; hacking; food; gastronomy
|OHM2013: Xander Soldaat - Hacking The Brick|
A hacker's insight into the new MINDSTORMS EV3 platform. Being part of the LEGO MINDSTORMS Expert Panel (LMEP) has allowed me to have access to the new upcoming LEGO robotics platform, the EV3, for quite some time now. During that time I've tinkered, cursed and played. My talk will be about my findings, tribulations and moments of joy, such as the sweet sound of a running motor or a blinking LED, as I made my way through the VM source code...
Keywords: OHM2013; talk; LEGO; MINDSTORMS; LMEP; LEGO MINDSTORMS Expert Panel; robotics; EV3; hacking; Xander Soldaat
|OHM2013: Robert Douglass - Open Source Bach|
How the ideas behind open source collaboration can influence the way classical musicians work together and share music. In 2012 pianist Kimiko Ishizaka and software company Musescore collaborated to create new public domain versions of the Goldberg Variations by Bach. Both a new recording and a new score were created, and the funding for the project came from Kickstarter.com. Along the way, Ishizaka became a focal point for the #copyleft fight in Germany, and her music went on to create even mor...
Keywords: OHM2013; talk; Bach; open source; Kimiko Ishizaka; Musescore; Goldberg Variations; copyleft
|OHM2013: katha - Modeling and Control of Rotary Winged Unmanned Aerial Vehicles|
The talk will cover different aspects of the autonomous flight of rotary winged aerial vehicles. We'll discuss the nonlinear model of the unmanned aerial vehicle (UAV), controller design, as well as hardware requirements, implementation of the control algorithm and gps-aided inertial navigation system. The topic will be divided into two parts. The first one will focus on a broader audience covering mainly the aspects of hardware design and navigational system with a small outlook towards autonom...
Keywords: OHM2013; talk; UAV; Unmanned aerial vehicle; controller design; design; gps; hardware design; navigation; navigational system; autonomous flight
|OHM2013: Zoltan Balazs - The quest for the client-side elixir against zombie browsers|
Hacking client side protection systems (sandboxes, internet security suites, financial endpoint protection systems) with malicious browser extensions. In 2012 I have created and published proof-of-concept malicious browser extensions for Firefox, Chrome and Safari. With these, one can steal cookies, passwords, spy on webcam, use the browser as a proxy, change financial transactions in the background, steal files, and many more malicious things...
Keywords: OHM2013; talk; sandbox; security; browser extention; firefox; chrome; safari; Zoltan Balazs
|OHM2013: RFguy - Masterkey Systems in private, industry and public infrastructure|
A View about mechanical/electronic Masterkey Systems that use at your home, in comercial installations and even critical public infrastructure. Analyse of possible attaks and masterkey generation. Take a view to the technical Background of mechanic and electronic Masterkey Systems. A detailed view different Variants of mechanical construction of these systems, advance and disadvance. Generation of the Masterkey without knowing it's mechanical data, defeats the security of obscurity, what is the ...
Keywords: OHM2013; talk; security; masterkey; RFguy
|OHM2013: Jean-Michel Friedt (jmfriedt) - Hacking the radiofrequency spectrum: GNURadio as a signal processing prototyping tool|
GNURadio as a signal processing prototyping tool for becoming familiar with analog and digital communication methods. We demonstrate the use of this software environment for implementing new digial communication mode decoding algorithms, qualifying low frequency circuits by using the audio card as a network analyzer, all the way to developing a FMCW RADAR. Radiofrequency communication has become ubiquoutous in the daily life of most of the western and south east asian population...
Keywords: OHM2013; talk; jmfriedt; Jean-Michel Friedt; ACARS; DVB; radio; FMCW RADAR; GNURadio; WTH; WTH2005; What the hack; SDR; Software Defined Radio; signal processing
|OHM2013: Vesna Manojlovic (BECHA) - How to rule the Internet (together with everybody else)|
How to rule the Internet (together with everybody else) Internet Governance and Hackers: what do they have in common What I want to achieve with my lecture is: * to enrich & diversify existing Internet Governance communities with young generation and "new blood" * to empower hackers, activists and free-software communities in influencing decisions in Internet Governance * to increase understanding and cooperation between these communities.....
Keywords: OHM2013; talk; Vesna Manojlovic; BECHA; Internet governance; hackers; internet; networking
|OHM2013: Rick van Rein - The road to Free Telephony is paved with IPv6|
The progress of free telephony is hindered by IPv4 and, specifically, NAT traversal issues. SIP over IPv6 on the other hand, is a triviality. This lecture details how to roll out SIP over IPv6 in today's world, including the tools necessary for doing so. As long as SIP depends on IPv4, it depends on NAT traversal techniques. That includes a dependency on an external RTP proxy and thus, for most users, on a telecom operator...
Keywords: OHM2013; talk; Rick van Rein; IPv6; SIP; telephony; IPv4; NAT; RTP; proxy; telecom; OpenFortress; SIPproxy64; 6bed4; peer-to-peer; p2p; peer to peer; 0cpm; ENUM
|OHM2013: Guy Martin - Real time network forensics using pom-ng|
Networks are part of our daily life. A lot of information transit through them but few really know what is actually transmitted and what information can be extracted. This talk will present pom-ng, a network forensic tool that performs real time analysis. The talk will focus on describing the coding challenges faced with such tool, architecture and what can be done with it. The talk will be split in 3 parts...
Keywords: OHM2013; talk; Guy Martin; lua; pom-ng; real time; network forensics; forensics; IP; de-fragmentation; TCP; TCP re-ordering; DNS caching; DNS
|OHM2013: Elger Jonker - Twilight: Dissecting a warez CD series|
Every month for eight years a warez compilation disc was released under the name Twilight. Selling over 60.000 each month, not getting caught and transforming from piece of art to shrinkwrap. From the mid-ninenties to the early 2000's a warez compilation cd was released under the name Twilight. It featured the latest and greatest in games and applications and was sold for 25 Dutch guilders via friends and collegues...
Keywords: OHM2013; talk; Elger Jonker; Twilight; warez
|OHM2013: Digital Whistleblowing with GlobaLeaks|
We'll introduce Digital Whistleblowing, how it's effectively used and adapted to different context: Investigative Journalism, Activism, Corporations and Governments. The new GlobaLeaks 0.2 software will be presented with a show case of design, security principle and tips on how to use it or hack it. Digital Whistleblowing with represent the next frontier for hackers, investigative journalists and the society at large to spot unethical practices of humans...
Keywords: OHM2013; talk; GlobaLeaks; digital whistleblowing; whistleblowing; investigative journalism; activism
|OHM2013: Ray McGovern - Integrity in intelligence, were is it when we need it most?|
Ray McGovern's opening talk on various intelligence skeletons since the Vietnam war and how they relate to our current problems. Related video links: Ray 0wns Donald Rumsfelt on the Iraq War: http://youtu.be/v1FTmuhynaw Ray interviewed on Democracy Now after being beater up by security goons for a silent protest:http://www.democracynow.org/2011/2/18/ex_cia_analyst_ray_mcgovern_beaten Powell and Rice assure everyone Iraq is NO THREAT pre-9/11 https://www.youtube.com/watch?v=y1X-I-38lrU (CNN) Ex-C...
Keywords: OHM2013; talk; Ray McGovern; Vietnam; Vietnam war; integrity; intelligence
|OHM2013: Floor Terra (Floort) - Responsible Disclosure|
This lecture will give an overview of the developments around responsible disclosure in the Netherlands. The lecture will feature a brief history, legal and practical motivations and feedback from both companies and hackers.
Keywords: OHM2013; talk; Floor Terra; floort; responsible disclosure; disclosure
|OHM2013: Ruud Schramp - Ram Memory Acquisition Using Live Bios Modification|
BIOS swap on server PC. Memory acquisition using firewire, reboot or userspace tools is standard. What if your intel motherboard BIOS wipes ECC memory and live plugging PCIe fails? The presentation describes an alternative way to initialise RAM using methods from the coreboot project. After initialisation the RAM can be dumped compressed over serial and a LPC-USB device.Event program page: https://program.ohm2013.org/event/157.html
Keywords: OHM2013; talk; Ruud Schramp; BIOS; RAM; RAM Acquisition; hacking; security; ECC
|OHM2013: Amanda Fielding - Drugs Bad? What Does Science Say?|
Drugs are bad for you so that's why they are banned in society and so we're stuck with a 'war on drugs'. But are drugs actually 'bad' for you? How do different illegal drugs compare to alcohol, cigarettes and coffee? Let's see what science has to say. The aim of the Beckley Foundation scientific programme is to increase our understanding of the functioning of the brain and consciousness. Our pioneering research is conducted in conjunction with leading scientific institutions around the globe, in...
Keywords: OHM2013; talk; Amanda Fielding; beckley foundation; Imperial College London; John Hopkins University; Kings College; drugs; war on drugs; illegal drugs; psychoactive substances; brain-imaging; fMRI; MEG
|OHM2013: Hans de raad/hcderaad - Webapplication (Drupal) Security Audits|
Web applications like Drupal offer a nice range of intrusion points for persons with malicious intents. This talk offers some insights in the various layers the application platform consists of and how to harden them. When developing and deploying web applications, the final result is a collection of software all carefully combined to offer a coherent platform. This platform however consists of several loosely coupled items which can, on various levels, offer possibilities of manipulating the de...
Keywords: OHM2013; talk; hcderaad; Hans de Raad; drupal; security audit; security; mod_security; audit
|OHM2013: Jurre Van Bergen, David Goulet - Use OTR!|
USE OTR is an organisation that works on security, encryption and usability of open source instant messengers (IM). Our goal is simple: improving security, usability and encryption of existing IM software. This talk will outline our organisation and the "Off The Record Messaging" software ecosystem and what's coming up for the future. We are an organisation that works on security, encryption and usability of open source instant messengers (IM)...
Keywords: OHM2013; talk; Jurre Van Bergen; David Goulet; OTR; Off the record; messaging; IM; instant messaging; cryptography
|OHM2013: mourn, edcv - Security Of VOIP Phones|
VoIP phones are deployed in a large number of companies. It has already been showed how to use a phone as a spying device (Hacking Cisco Phones [29C3] by Cui and Costello). In this presentation we will focus on other brands of VoIP phones and show how to use reverse engineering in order to be able to log in some phone RTOS and generate rogue updates for permanent "modifications" as well as understanding the phone internals in order to use it as a remote spying device...
Keywords: OHM2013; mourn; edcv; VOIP; voice over internet protocol; voice over IP; broadcom; vxWorks; RTOS; Cisco; 29C3; cui; costello; reverse engineering; firmware; Original Design Manufacturer; security
|OHM2013: Henry Story/bblfish - The Secure Social Web|
We will give a very quick overview of progress in developing the global social web using linked data, WebID authentication and Web Access Control.Event program page: https://program.ohm2013.org/event/98.html
Keywords: OHM2013; Henry Story; bblfish; social web; secure; security; WebID authentication; WebID; Web Access Control; WAC; linked data
|OHM2013: Phons Bloemen - Abuse Information Exchange|
The Abuse Information Exchange is a project to help abuse desks of ISPs gathering the information about zombies and contaminated machines inside the networks(AS numbers) they are responsible for. The exchange will gather the information, correlates and splits it up by AS number and provide it in a generic, human and machine readable format This project is done by the 7 big access ISPs in NL. It is currently running in a pilot phase, with the information provided by Shadowserver...
Keywords: OHM2013; talk; Phons Bloemen; lightning talk; abuse information; Abuse Information Exchange; networking; ISP; Internet Service Provider; shadowserver; reliable notifiers; ASN; IP; netherlands; holland; The Netherlands
|OHM2013: Sara Sibai - OHM Spoken Poetry|
Full text of poem below original description of event: ======================================== At OHM2013, Spoken is a spoken-word tribute to: Observing, Hacking, Making. I would be honored to perform and share unique spoken-word poems in the hopes of inspiring others to do the same. Spoken can be labelled as an art performance, but it is a co-created art performance that can be joined by any who attend and wish to express how they Observe, Hack, Make, via the medium of poetry...
Keywords: OHM2013; talk; Sara Sibai; spoken poetry; poetry; art performance
|OHM2013: Annie Machon - Ending The War On Drugs And People|
The tide of history is with us — more and more countries are speaking out about the failure of prohibition. LEAP (Law Enforcement Against Prohibition) supports and contributes to this discussion. LEAP has representatives across the world with a wide range of professional expertise: police officers, drug czars, judges, prison governors, lawyers, drug enforcement officers, and even the occasional former spook.… Our varied experiences on the front...
Keywords: OHM2013; talk; Annie Machon; war on drugs; narcotics; LEAP; Law Enforcement Against Prohibition; prohibition
|OHM2013: Vinay Gupta - One Network. One World. Designing For A 7 Plus Billion Person World.|
Within 10 years, the villages and slums of the world are going to join the internet, unleashing revolutions in education, connectivity, and potentially politics. In this talk we will discuss engineering out way out of a global crisis that few are even willing to full acknowledge: we are slaughtering the poor and killing the ecosystem we evolved in at an ever-increasing rate, while our governance structures regulate the only structure humanity has built which might scale to provide a solution...
Keywords: OHM2013; talk; Vinay Gupta; networking; network design
|OHM2013: Anwen - Happiness: The Metadata|
The pursuit of happiness is an age-old meme that desperately requires an update to meet the needs of the networked nerd. Here's how and why. To paraphrase Eric S. Raymond, every (Open Data) project starts with an itch you have to scratch. My "itch" had already been the topic of mental health in hacker and activist communities for quite some time - but with the death of Aaron Swartz in Jan.2013, the need to scratch became unbearable...
Keywords: OHM2013; talk; esr; OKCupid; happiness; metadata; Anwen; open data; Aaron Swartz; psychology; big data
|OHM2013: Should Law Enforcement Have Hacking Powers|
In several European countries proposals for vast expansion of the powers of law enforcement in the digital realm are floating about. The most concrete is a Dutch proposed law that among other things gives law enforcement the authority to break into remote computers. The panel focuses on the pros and cons of such powers.Event program page: https://program.ohm2013.org/event/335.html
Keywords: OHM2013; talk; Herbert Bos; Rejo Zenger; Merel Koning; hacking; law enforcement
|OHM2013: Breaking The Taboo (With QA) (film screening)|
Screening of cult film "Breaking the Taboo" - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation, Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals...
Keywords: OHM2013; talk; Amanda Fielding; Annie Machon; John Gilmore; screening; beckley foundation; LEAP; Law Enforcement Against Prohibition; prohibition; drug; drugs; narcotics
|OHM2013: John Gilmore, Paul Wouters - Hugh Daniel Crypto Memorial Lecture|
A crypto-memorial in honour of cypherpunk Hugh Daniel, who died June 3rd, 2013 On June 3rd, cypherpunk Hugh Daniel unexpectedly died. Those who met him, know him. Principled to the core, and very present in any room, he compelled people to listen to him - both by what he said, and how loud he said it. He was one of the cypherpunks involved with getting PGP exported to the free world by turning the software into a book, exporting it, and OCRing it at Hacking In Progress ("HIP 97"), his first out...
Keywords: OHM2013; talk; John Gilmore; Paul Wouters; Hugh Daniel; crypto; cryptography; memorial; lecture; DNSSEC; IPsec; Libreswan; Openswan; HIP; HIP97; Hacking In Progress; OCR; PGP; GPG
|OHM2013: stick - Trezor: Bitcoin Hardware Wallet|
Trezor is a hardware wallet for Bitcoin. We've identified the main problems of mass adoption of Bitcoin and we try to solve them with this small device.Program schedule page: https://program.ohm2013.org/event/42.html
Keywords: OHM2013; talk; stick; bitcoin; trezor; hardware
|OHM2013: Hans de Raad/hcderaad - Alternative To Commercial Web Analytics Tools A Cookie Story|
Talk aimed at the current state of EU cookie/privacy laws and how to utilize open source software to comply with that. As a lot of things on the web, techniques that were once invented with a pretty clear scope (or seemingly so) usually don't take long to find multiple use cases. In case of cookies, the nicest form of this is persisting session states between HTTP requests, the nastier form is the mechanism with which a lot of sites knowingly hand over visitor-logging to third parties (with real...
Keywords: OHM2013; talk; piwik; cookies; Hans de Raad; drupal
|OHM2013: Stefan Arentz - A Holistic View Of Firefox OS|
Firefox OS is a new mobile operating system developed by Mozilla. It is built on web technology and is following the same principals which have made the web a success: open, hackable, universal. This talk will explain how Firefox OS functions both at low and high level, how you can hack on it and how you can write applications for it. Firefox OS is built entirely on web technologies using Open Source Software...
Keywords: OHM2013; talk; FirefoxOS; Firefox OS; mozilla; Stefan Arentz
|OHM2013: Jaya Baloo - Attitude And Action From KPN Security|
A presentation of how KPN sees the infosec landscape of threats and risks and how we prepared a strategy to address it. We will present our approach to information security and ourselves. Our team will explain what we do every day to help make stuff more secure, and that its an ongoing activity.Event Schedule page: https://program.ohm2013.org/event/218.html
Keywords: OHM2013; Jaya Baloo; KPN; security
|OHM2013: Tim Becker - Another Rambling About EMV|
A brief introduction to EMV, the protocol spoken between smart card based credit cards and terminals. A mixture of plastic and RF, bits, bytes and anecdotes, based around a single payment transaction performed live on stage. My talk will be an introduction helping beginners to start playing around with (chip based & contactless) credit cards and provide some deeper insight for people with knowledge of chip card but little knowledge of EMV...
Keywords: OHM2013; talk; EMV; Tim Becker; Chip&PIN; visa; mastercard; 29C3
|OHM2013: Krunch - Datamining A Cloud That Wasnt Meant To Be Public How I Get My Free Amateur P0rn|
This short talk describes an undocumented feature of a certain web storage provider that allows some operations typical users of the service would probably not expect. We will explain how the feature was discovered, how it was exploited and what kind of data we have been able to retrieve.
Keywords: OHM2013; krunch; datamining; data mining; cloud; talk
|OHM2013: Akos Maroy - Open Aviation Map|
Open Aviation Map is a project that aims to create a free aviation map infrastructure for Europe, similar to Open Street Maps, but for aviation.Homepage: http://www.openaviationmap.org/Program page: https://program.ohm2013.org/event/27.html
Keywords: OHM2013; aviation; talk; Akos Maroy; map; mapping
|OHM2013: gmc - Opening Ceremony|
A welcome to all visitors, a short overview of the 4 years since HAR2009, a brief glimpse ahead at the forthcoming 4 years and possibly a surprise announcement.https://program.ohm2013.org/event/7.html
Keywords: OHM2013; gmc
|OHM2013: Philippe Langlois - Rooting The HLRs Mobile And Critical Infrastructure Insecurity|
Nothing's wrong with Telecom Security? No, not according to vendors, not according to some operators. Why? Because most of them benefit from the relative absence of awareness of its actual lack of security. SS7 is totally unauthenticated. Even Diameter, which is recent, doesn't show much in term of message authentication. Supporting systems are unpatched and using default. Telecom applications are developed without security in mind...
Keywords: OHM2013; talk; HLR; SS7; HSS; MME; MSC; ATCA; IPsec; GSMA; GSM; 3GPP; LTE
|OHM2013: gmc - Closing Ceremony|
Keywords: OHM2013; gmc
|OHM2013: Netz39/bastinat0r - Gathering Statistics With The SpaceApi|
In my current project I gather and visualize data from the spaceAPI. I will tell people about my project and what is cool about spaceAPI. Because we have no official opening hours at our hackerspace I wanted to gather statistics to see when the door is open. Then I extendet the software to work for all spaces in the directory of spaceAPI.net - you can see the result at http://spacestatus.bastinat0r.dePresenter: bastinat0rhttps://program.ohm2013.org/event/432.html
Keywords: OHM2013; talk; lightning talk; bastinat0r; spaceapi; space; hackerspace; Netz39
|OHM2013: Quux - ColoClue lightening talk|
Introduction to ColoClue and why you want to become a member.http://coloclue.net/https://program.ohm2013.org/event/386.html
Keywords: OHM2013; talk; lightning talk; ColoClue; quux